DEVICE FOR DETECTING VARIANT MALICIOUS CODE ON BASIS OF NEURAL NETWORK LEARNING, METHOD THEREFOR, AND COMPUTER-READABLE RECORDING MEDIUM IN WHICH PROGRAM FOR EXECUTING SAME METHOD IS RECORDED
The present invention provides an apparatus for detecting variants of malicious code based on neural network learning, a method therefor and a computer readable recording medium storing a program for performing the method. According to the present invention, one-dimensional binary data is converted...
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Patent |
Sprache: | eng ; fre ; ger |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | |
container_volume | |
creator | BYEON, Hyeong Jin LEE, Won Kyung CHUNG, Ui Jung |
description | The present invention provides an apparatus for detecting variants of malicious code based on neural network learning, a method therefor and a computer readable recording medium storing a program for performing the method. According to the present invention, one-dimensional binary data is converted into two-dimensional data without separate extraction of features, and deep learning is performed through a neural network having a nonlinear multilayered structure, such that the features of the malicious code and variants thereof may be extracted by performing the deep learning. Therefore, since no separate feature extraction tool or artificial effort by an expert is required, an analysis time is reduced, and variants of malicious code that cannot be captured by existing malicious code classification tools may be detected by performing the deep learning. |
format | Patent |
fullrecord | <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_EP3483767A1</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>EP3483767A1</sourcerecordid><originalsourceid>FETCH-epo_espacenet_EP3483767A13</originalsourceid><addsrcrecordid>eNqNjrFOAzEQRK-hQMA_7AckBTpEaDf2XLzi7D3t2QldFCFTIYgU_o9fwwToqaaZN_Muu0-PrTjQoEYeGS5L2tCWTThlijyKEy0zOfUgTbTmWWbSgRKK8dgi79QeaQRbauiCInJQTznA0FYXxMk3PE4lw5YG9rweQQan5r_PIryUSJJoF8QFmkw3xvGshCe4claaOeJvuxn84PDX3cXL4fVUb37zqqMB2YVlPb7v6-l4eK5v9WOPqb976Ff3K77t_1H5Akm7THg</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>DEVICE FOR DETECTING VARIANT MALICIOUS CODE ON BASIS OF NEURAL NETWORK LEARNING, METHOD THEREFOR, AND COMPUTER-READABLE RECORDING MEDIUM IN WHICH PROGRAM FOR EXECUTING SAME METHOD IS RECORDED</title><source>esp@cenet</source><creator>BYEON, Hyeong Jin ; LEE, Won Kyung ; CHUNG, Ui Jung</creator><creatorcontrib>BYEON, Hyeong Jin ; LEE, Won Kyung ; CHUNG, Ui Jung</creatorcontrib><description>The present invention provides an apparatus for detecting variants of malicious code based on neural network learning, a method therefor and a computer readable recording medium storing a program for performing the method. According to the present invention, one-dimensional binary data is converted into two-dimensional data without separate extraction of features, and deep learning is performed through a neural network having a nonlinear multilayered structure, such that the features of the malicious code and variants thereof may be extracted by performing the deep learning. Therefore, since no separate feature extraction tool or artificial effort by an expert is required, an analysis time is reduced, and variants of malicious code that cannot be captured by existing malicious code classification tools may be detected by performing the deep learning.</description><language>eng ; fre ; ger</language><subject>CALCULATING ; COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS ; COMPUTING ; COUNTING ; ELECTRIC DIGITAL DATA PROCESSING ; PHYSICS</subject><creationdate>2019</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20190515&DB=EPODOC&CC=EP&NR=3483767A1$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,776,881,25542,76516</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20190515&DB=EPODOC&CC=EP&NR=3483767A1$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>BYEON, Hyeong Jin</creatorcontrib><creatorcontrib>LEE, Won Kyung</creatorcontrib><creatorcontrib>CHUNG, Ui Jung</creatorcontrib><title>DEVICE FOR DETECTING VARIANT MALICIOUS CODE ON BASIS OF NEURAL NETWORK LEARNING, METHOD THEREFOR, AND COMPUTER-READABLE RECORDING MEDIUM IN WHICH PROGRAM FOR EXECUTING SAME METHOD IS RECORDED</title><description>The present invention provides an apparatus for detecting variants of malicious code based on neural network learning, a method therefor and a computer readable recording medium storing a program for performing the method. According to the present invention, one-dimensional binary data is converted into two-dimensional data without separate extraction of features, and deep learning is performed through a neural network having a nonlinear multilayered structure, such that the features of the malicious code and variants thereof may be extracted by performing the deep learning. Therefore, since no separate feature extraction tool or artificial effort by an expert is required, an analysis time is reduced, and variants of malicious code that cannot be captured by existing malicious code classification tools may be detected by performing the deep learning.</description><subject>CALCULATING</subject><subject>COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>ELECTRIC DIGITAL DATA PROCESSING</subject><subject>PHYSICS</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2019</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNqNjrFOAzEQRK-hQMA_7AckBTpEaDf2XLzi7D3t2QldFCFTIYgU_o9fwwToqaaZN_Muu0-PrTjQoEYeGS5L2tCWTThlijyKEy0zOfUgTbTmWWbSgRKK8dgi79QeaQRbauiCInJQTznA0FYXxMk3PE4lw5YG9rweQQan5r_PIryUSJJoF8QFmkw3xvGshCe4claaOeJvuxn84PDX3cXL4fVUb37zqqMB2YVlPb7v6-l4eK5v9WOPqb976Ff3K77t_1H5Akm7THg</recordid><startdate>20190515</startdate><enddate>20190515</enddate><creator>BYEON, Hyeong Jin</creator><creator>LEE, Won Kyung</creator><creator>CHUNG, Ui Jung</creator><scope>EVB</scope></search><sort><creationdate>20190515</creationdate><title>DEVICE FOR DETECTING VARIANT MALICIOUS CODE ON BASIS OF NEURAL NETWORK LEARNING, METHOD THEREFOR, AND COMPUTER-READABLE RECORDING MEDIUM IN WHICH PROGRAM FOR EXECUTING SAME METHOD IS RECORDED</title><author>BYEON, Hyeong Jin ; LEE, Won Kyung ; CHUNG, Ui Jung</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_EP3483767A13</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng ; fre ; ger</language><creationdate>2019</creationdate><topic>CALCULATING</topic><topic>COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>ELECTRIC DIGITAL DATA PROCESSING</topic><topic>PHYSICS</topic><toplevel>online_resources</toplevel><creatorcontrib>BYEON, Hyeong Jin</creatorcontrib><creatorcontrib>LEE, Won Kyung</creatorcontrib><creatorcontrib>CHUNG, Ui Jung</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>BYEON, Hyeong Jin</au><au>LEE, Won Kyung</au><au>CHUNG, Ui Jung</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>DEVICE FOR DETECTING VARIANT MALICIOUS CODE ON BASIS OF NEURAL NETWORK LEARNING, METHOD THEREFOR, AND COMPUTER-READABLE RECORDING MEDIUM IN WHICH PROGRAM FOR EXECUTING SAME METHOD IS RECORDED</title><date>2019-05-15</date><risdate>2019</risdate><abstract>The present invention provides an apparatus for detecting variants of malicious code based on neural network learning, a method therefor and a computer readable recording medium storing a program for performing the method. According to the present invention, one-dimensional binary data is converted into two-dimensional data without separate extraction of features, and deep learning is performed through a neural network having a nonlinear multilayered structure, such that the features of the malicious code and variants thereof may be extracted by performing the deep learning. Therefore, since no separate feature extraction tool or artificial effort by an expert is required, an analysis time is reduced, and variants of malicious code that cannot be captured by existing malicious code classification tools may be detected by performing the deep learning.</abstract><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | |
ispartof | |
issn | |
language | eng ; fre ; ger |
recordid | cdi_epo_espacenet_EP3483767A1 |
source | esp@cenet |
subjects | CALCULATING COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS COMPUTING COUNTING ELECTRIC DIGITAL DATA PROCESSING PHYSICS |
title | DEVICE FOR DETECTING VARIANT MALICIOUS CODE ON BASIS OF NEURAL NETWORK LEARNING, METHOD THEREFOR, AND COMPUTER-READABLE RECORDING MEDIUM IN WHICH PROGRAM FOR EXECUTING SAME METHOD IS RECORDED |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-15T09%3A12%3A04IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=BYEON,%20Hyeong%20Jin&rft.date=2019-05-15&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EEP3483767A1%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |